prctl: exe link permission error changed from -EINVAL to -EPERM
authorNicolas Viennot <Nicolas.Viennot@twosigma.com>
Sun, 19 Jul 2020 10:04:16 +0000 (12:04 +0200)
committerChristian Brauner <christian.brauner@ubuntu.com>
Sun, 19 Jul 2020 18:14:42 +0000 (20:14 +0200)
This brings consistency with the rest of the prctl() syscall where
-EPERM is returned when failing a capability check.

Signed-off-by: Nicolas Viennot <Nicolas.Viennot@twosigma.com>
Signed-off-by: Adrian Reber <areber@redhat.com>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Link: https://lore.kernel.org/r/20200719100418.2112740-7-areber@redhat.com
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
kernel/sys.c

index a3f4ef0bbda33dc2f04d93a3a9c987f2c198c95c..ca11af9d815d9d2490e224920df54e77f0fbf92b 100644 (file)
@@ -2015,7 +2015,7 @@ static int prctl_set_mm_map(int opt, const void __user *addr, unsigned long data
                 * This may have implications in the tomoyo subsystem.
                 */
                if (!checkpoint_restore_ns_capable(current_user_ns()))
-                       return -EINVAL;
+                       return -EPERM;
 
                error = prctl_set_mm_exe_file(mm, prctl_map.exe_fd);
                if (error)